Patents by Inventor M. Cannon
M. Cannon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140256364Abstract: A method of using an intercom on a cordless telephone during an active call. The active call is put on hold while the intercom is in use. Once the call is re-activated, the intercom is shut off. This system may be designed for a cordless telephone with one handset or a plurality of handsets.Type: ApplicationFiled: December 4, 2013Publication date: September 11, 2014Applicant: Agere Systems Inc.Inventors: Joseph M. Cannon, James A. Johanson
-
Patent number: 8788466Abstract: One aspect of the present invention includes enabling the efficient transfer of deduplicated data between storage pools in a storage management system without unnecessary reassembly and deduplication of data objects. In one embodiment, the storage management system tracks deduplication information for the data chunks of data objects within an index at the storage management system level, in addition to tracking storage information for each data object within another index at the storage management system level. The data chunk deduplication information is then accessible by any storage pool. Accordingly, transfers of the data objects and data chunks of the data object are easily facilitated, even between non-deduplicating and deduplicating storage pools.Type: GrantFiled: August 5, 2008Date of Patent: July 22, 2014Assignee: International Business Machines CorporationInventors: Matthew J. Anglin, David M. Cannon, Howard N. Martin
-
Patent number: 8775390Abstract: A chunk index has information on chunks in a storage space referenced in objects in the storage space. The chunk index includes a reference count for each chunk indicating a number of objects in which the chunk is referenced and a reference measurement representing a level of data object references to the chunk. One chunk is selected to remove from the storage space based on a criteria applied to the reference measurements of chunks having reference counts indicating that the chunks are not referenced in one object in the storage space.Type: GrantFiled: May 22, 2012Date of Patent: July 8, 2014Assignee: International Business Machines CorporationInventors: Matthew J. Anglin, David M. Cannon, Colin S. Dawson, Robert S. Elder
-
Patent number: 8769310Abstract: Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object of chunks to store at the server is generated. A first portion of the chunks in the data object is encrypted with the client private key and the first portion of the chunks in the data object encrypted with the client private key are sent to the server to store. A second portion of the chunks in the data object not encrypted with the client private key are sent to the server to store.Type: GrantFiled: October 21, 2011Date of Patent: July 1, 2014Assignee: International Business Machines CorporationInventors: David M. Cannon, Avishai H. Hochberg, James P. Smith, Mark L. Yakushev
-
Patent number: 8762743Abstract: Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object of chunks to store at the server is generated. A first portion of the chunks in the data object is encrypted with the client private key and the first portion of the chunks in the data object encrypted with the client private key are sent to the server to store. A second portion of the chunks in the data object not encrypted with the client private key are sent to the server to store.Type: GrantFiled: May 30, 2012Date of Patent: June 24, 2014Assignee: International Business Machines CorporationInventors: David M. Cannon, Avishai H. Hochberg, James P. Smith, Mark L. Yakushev
-
Patent number: 8738575Abstract: Systems and methods for retrieving data from a storage system having a plurality of storage pools are provided. The method comprises processing configurable data retrieval instructions to determine a first storage pool from which target backup data is to be retrieved, in response to a data restore request; and retrieving the target backup data from the first storage pool to satisfy the restore request. The configurable data retrieval instructions are managed by a source external to the storage system with administrative authority to change the configurable data retrieval instructions to optimize data restoration from the storage system.Type: GrantFiled: September 17, 2007Date of Patent: May 27, 2014Assignee: International Business Machines CorporationInventors: Matthew J. Anglin, David M. Cannon, Colin S. Dawson, Erick C. Kissel, Howard N. Martin, Jonathan M. Haswell
-
Patent number: 8688149Abstract: A method of using an intercom on a cordless telephone during an active call. The active call is put on hold while the intercom is in use. Once the call is re-activated, the intercom is shut off. This system may be designed for a cordless telephone with one handset or a plurality of handsets.Type: GrantFiled: March 11, 2013Date of Patent: April 1, 2014Assignee: Agere Systems LLCInventors: Joseph M. Cannon, James A. Johanson
-
Publication number: 20140052952Abstract: A chunk index has information on chunks in a storage space referenced in objects in the storage space. The chunk index includes a reference count for each chunk indicating a number of objects in which the chunk is referenced and a reference measurement representing a level of data object references to the chunk. One chunk is selected to remove from the storage space based on a criteria applied to the reference measurements of chunks having reference counts indicating that the chunks are not referenced in one object in the storage space.Type: ApplicationFiled: October 23, 2013Publication date: February 20, 2014Applicant: International Business Machines CorporationInventors: Matthew J. Anglin, David M. Cannon, Colin S. Dawson, Robert S. Elder
-
Patent number: 8554744Abstract: Provided are a method, system, and article of manufacture, wherein a data structure corresponding to a set of client nodes selected from a plurality of client nodes is generated. Objects from the selected set of client nodes are stored in the data structure. A determination is made that an object corresponding to a client node of the selected set of client nodes has to be stored. An additional determination is made as to whether the object has already been stored in the data structure by any client node of the selected set of client nodes. The object is stored in the data structure, in response to determining that the object has not already been stored in the data structure by any client node of the selected set of client nodes.Type: GrantFiled: April 22, 2011Date of Patent: October 8, 2013Assignee: International Business Machines CorporationInventors: David M. Cannon, Colin S. Dawson, Robert C. Edwards, Jr.
-
Patent number: 8515909Abstract: The present invention provides for an enhanced method and system for assuring integrity of deduplicated data objects stored within a storage system. A digital signature of the data object is generated to determine if the data object reassembled from a deduplicated state is identical to its pre-deduplication state. In one embodiment, generating the object signature of a data object before deduplication comprises generating an object signature from intermediate hash values computed from a hash function operating on each data chunk within the data object, the hash function also used to determine duplicate data chunks. In an alternative embodiment, generating the object signature of a data object before deduplication comprises generating an object signature on a portion of each data chunk of the data object.Type: GrantFiled: April 29, 2008Date of Patent: August 20, 2013Assignee: International Business Machines CorporationInventors: Matthew J. Anglin, Oliver Augenstein, David M. Cannon
-
Patent number: 8495032Abstract: One aspect of the present invention includes enabling data chunks to be shared among different storage pools within a storage management system, according the use of deduplication and storage information kept at the system level, and applied with policy-based rules that define the scope of deduplication. In one embodiment, the parameters of performing deduplication are defined within the policy, particularly which of the plurality of storage pools allow deduplication to which other pools. Accordingly, a data object may be linked to deduplicated data chunks existent within other storage pools, and the transfer of a data object may occur by simply creating references to existing data chunks in other pools provided the policy allows the pool to reference chunks in these other pools. Additionally, a group of storage pools may be defined within the policy to perform a common set of deduplication activities across all pools within the group.Type: GrantFiled: October 1, 2008Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventors: Matthew J. Anglin, David M. Cannon
-
Publication number: 20130159648Abstract: In one aspect of the present description, in connection with storing a first deduplicated data object in a primary storage pool, described operations include determining the duration of time that the first data object has resided in the primary storage pool, and comparing the determined duration of time to a predetermined time interval. In addition, described operations include, after the determined duration of time meets or exceeds the predetermined time interval, determining if the first data object has an extent referenced by another data object, and determining whether to move the first data object from the primary storage pool to a secondary storage pool as a function of whether the first data object has an extent referenced by another data object after the determined duration of time meets or exceeds the predetermined time interval. Other features and aspects may be realized, depending upon the particular application.Type: ApplicationFiled: May 30, 2012Publication date: June 20, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Matthew J. Anglin, David M. Cannon, Colin S. Dawson, Robert S. Elder
-
Publication number: 20130159645Abstract: In one aspect of the present description, in connection with storing a first deduplicated data object in a primary storage pool, described operations include determining the duration of time that the first data object has resided in the primary storage pool, and comparing the determined duration of time to a predetermined time interval. In addition, described operations include, after the determined duration of time meets or exceeds the predetermined time interval, determining if the first data object has an extent referenced by another data object, and determining whether to move the first data object from the primary storage pool to a secondary storage pool as a function of whether the first data object has an extent referenced by another data object after the determined duration of time meets or exceeds the predetermined time interval. Other features and aspects may be realized, depending upon the particular application.Type: ApplicationFiled: December 15, 2011Publication date: June 20, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Matthew J. Anglin, David M. Cannon, Colin S. Dawson, Robert S. Elder
-
Patent number: 8464243Abstract: During execution of an existing scheduling computer program on a client node, an update computer program and a self-describing automatic installation package are downloaded to the client node from a logical depot node implemented on an existing management server. Therefore, advantageously, no physical depot node or other additional computing device is needed for the client node to update itself. Execution of the update computer program is spawned on the client node from the existing scheduling computer program. As such, the update computer program inherits root access to the client node and security credentials to the management server from the scheduling computer program—advantageously, then, a user does not have to perform any laborious configuration of the client node in order to update the node. The client node ultimately updates itself using the self-describing automatic installation package, which includes all the information needed for the client node to update itself.Type: GrantFiled: August 21, 2009Date of Patent: June 11, 2013Assignee: International Business Machines CorporationInventors: Jean X. Yu, James J. Myers, Gergana V. Markova, Thu Nguyen, David M. Cannon, Kenneth E. Hannigan, James P. Smith, Colin S. Dawson
-
Patent number: 8453257Abstract: The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.Type: GrantFiled: August 14, 2009Date of Patent: May 28, 2013Assignee: International Business Machines CorporationInventors: Matthew J. Anglin, David M. Cannon, Avishai H. Hochberg, Alexei Kojenov, James P. Smith, Mark L. Yakushev
-
Publication number: 20130103945Abstract: Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object of chunks to store at the server is generated. A first portion of the chunks in the data object is encrypted with the client private key and the first portion of the chunks in the data object encrypted with the client private key are sent to the server to store. A second portion of the chunks in the data object not encrypted with the client private key are sent to the server to store.Type: ApplicationFiled: May 30, 2012Publication date: April 25, 2013Applicant: International Business Machines CorporationInventors: David M. Cannon, Avishai H. Hochberg, James P. Smith, Mark L. Yakushev
-
Publication number: 20130101113Abstract: Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object of chunks to store at the server is generated. A first portion of the chunks in the data object is encrypted with the client private key and the first portion of the chunks in the data object encrypted with the client private key are sent to the server to store. A second portion of the chunks in the data object not encrypted with the client private key are sent to the server to store.Type: ApplicationFiled: October 21, 2011Publication date: April 25, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David M. Cannon, Avishai H. Hochberg, James P. Smith, Mark L. Yakushev
-
Patent number: 8423055Abstract: A method of using an intercom on a cordless telephone during an active call. The active call is put on hold while the intercom is in use. Once the call is re-activated, the intercom is shut off. This system may be designed for a cordless telephone with one handset or a plurality of handsets.Type: GrantFiled: February 7, 2012Date of Patent: April 16, 2013Assignee: Agere Systems LLCInventors: Joseph M. Cannon, James A. Johanson
-
Publication number: 20130054518Abstract: A source server maintains a replication rule specifying a condition for a replication attribute and a replication action to take if the condition with respect to the replication attribute is satisfied, wherein the replication action indicates to include or exclude the object having an attribute value for the replication attribute that satisfies the condition. For each of the objects, the replication rule is applied by determining an attribute value of the object corresponding to the replication attribute in the replication rule and determining whether the determined attribute value satisfies the condition for the replication attribute defined in the determined replication rule. The replication action on the object in response to determining that the determined attribute value satisfies the condition for the replication attribute.Type: ApplicationFiled: August 30, 2011Publication date: February 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Matthew J. Anglin, David M. Cannon, Colin S. Dawson, Howard N. Martin
-
Publication number: 20130054523Abstract: Data objects are replicated from a source storage managed by a source server to a target storage managed by a target server. A source list is built of objects at the source server to replicate to the target server. The target server is queried to obtain a target list of objects at the target server. A replication list is built indicating objects on the source list not included on the target list to transfer to the target server. For each object in the replication list, data for the object not already at the target storage is sent to the target server and metadata on the object is sent to the target server to cause the target server to include the metadata in an entry for the object in a target server replication database. An entry for the object is added to a source server replication database.Type: ApplicationFiled: August 30, 2011Publication date: February 28, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Matthew J. Anglin, David M. Cannon, Colin S. Dawson, Barry Fruchtman, Mark A. Haye, Howard N. Martin